Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-08-29 16:18:00 UTC
Ars Technica
Ars Technica
Microsoft obliquely acknowledges Windows 0-day bug published on Twitter

Flaw allows a local user to obtain System privileges.

Tech 0-Day Microsoft Privilege Escalation Security Windows
2018-08-27 13:00:00 UTC
Ars Technica
Ars Technica
The adventures of lab ED011—“Nobody would be able to duplicate what happened there”

One Romanian campus computer lab both pentested the world and eventually helped protect it.

Features Tech Features Hacking Romania Security
2018-08-21 17:26:00 UTC
Ars Technica
Ars Technica
Chrome 69 will take the next step to killing Flash, roll out new design

Flash will have to be enabled every time a site tries to use it.

Tech Browsers Chrome Design Flash Material Security User Interface
2018-08-14 19:18:00 UTC
Ars Technica
Ars Technica
Intel’s SGX blown wide open by, you guessed it, a speculative execution attack

Speculative execution attacks truly are the gift that keeps on giving.

Tech Encryption Intel Meltdown Programming Security Sgx Spectre X86
2018-08-09 17:08:00 UTC
Ars Technica
Ars Technica
Windows 10 to get disposable sandboxes for dodgy apps

Apps will be run in a virtual machine that's discarded after use.

Staff Hyper-V Microsoft Sandbox Security Virtualization Windows
2018-08-02 22:08:00 UTC
Ars Technica
Ars Technica
Heads-up: 2FA provider Duo Security to be acquired by Cisco (ugh)

Both companies insist nothing will change, but this former Cisco customer has doubts.

Biz & IT Cisco Cisco Systems Duo Duo Security Internet Security Security
2018-07-26 21:40:00 UTC
Ars Technica
Ars Technica
New Spectre attack enables secrets to be leaked over a network

It's no longer necessary to run attacker code on the victim system.

Tech AMD ARM Intel Meltdown Network Processors Security Side Channel Spectre Speculative Execution
2018-07-12 22:06:00 UTC
Ars Technica
Ars Technica
Microsoft offers extended support for Windows, SQL 2008—but with a catch

An extra three years of patches are being offered to in-cloud users.

Tech Microsoft Security SQL Server SQL Server 2008 Support Updates Windows Server Windows Server 2008 Windows Server 2008 R2
2018-07-10 21:00:00 UTC
Ars Technica
Ars Technica
New Spectre-like attack uses speculative execution to overflow buffers

Research is continuing to find new attack vectors.

Tech AMD ARM Intel Meltdown Processors Security Spectre Speculative Execution
2018-06-25 22:18:00 UTC
Ars Technica
Ars Technica
Hyperthreading under scrutiny with new TLBleed crypto key leak

A new attack prompted OpenBSD's developers to disable hyperthreading by default.

Tech Intel OpenBSD Processors Security

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
29 April 2024
BREACHAWARE HQ

A total of 13 breaches were found and analysed resulting in 4,834,779 leaked accounts containing a total of 21 different data types. The breaches found publicly and freely available included Stealer Log 0452, Redaq, Stealer Log 0453, Kharkov and Stealer Log 0451